Specific embodiment
Before the present invention is disclosed and described it will be appreciated that the invention is not restricted to specific structure, program step or
Material disclosed herein, but, the present invention extends to the equivalent of person of ordinary skill in the relevant's understanding.It should be appreciated that
The term herein applied is used for describing the purpose of specific example, is not intended to limit.Same reference number in different accompanying drawings
Represent same element.The accompanying drawing providing in flow chart and program is provided in and steps and operations is explicitly described, and not necessarily must
The specific order of instruction or sequence.
Exemplary embodiment
The initial general introduction of technical em- bodiments is provided below, subsequently describes particular technology embodiment in detail.This initial summary is anticipated
Reader to be helped quickly understands technology it is therefore intended that the key feature for identification technology or key character, is also not intended to limit
Make the scope of theme required for protection.
As can be seen that increasing with user density, distributed scheduling becomes optimum.Running into centralized scheduling entity,
For example during enode b (eNB) idle emergency, this distributed scheduling is equally also very useful.However, distributed tune
The use of degree can utilize substantial amounts of expense, particularly in the system with high density user.For example, in traditional contention mechanism
In, it is referred to as FlahLinQ, for N number of bandwidth authorizing, it is with least 2N block or section come scheduling bandwidth mandate.Become very with N
Greatly, expense may become excessive.
According to an embodiment, distributed scheduling scheme can be used, and which considerably reduces amount of overhead, and allows
The D2D link of low priority can be scheduled with high priority D2D link simultaneously, and controls to high-priority users link
Interference.Because iterationses increase, more D2D links can be scheduled, and causes more high spatial huge profit to be used and higher throughput.
Realizing the handling capacity close with the upper limit needs substantial amounts of iteration, and this causes the cost of high expense.However, by using relatively low preferential
The exploration mandate of level link, can realize the handling capacity close to the upper limit under the iteration of relatively low number of times.This is by following section
Discussed further in falling.
Wireless mobile telecommunication technology sends data using various standards and agreement between base station and Wireless Telecom Equipment.
Wireless communication system standards and agreement can include, for example third generation affiliate engineering (3GPP) Long Term Evolution (LTE);Electrically
With EEA Eelectronic Eengineering Association (IEEE) 802.16 standard, i.e. worldwide interoperability for microwave accesses known to industrial organization (WiMAX);And IEEE
802.11 standards, i.e. Wi-Fi known to industrial organization.In the 3GPP Radio Access Network (RAN) according to LTE, base station is called
Make E-UTRAN (E-UTRAN) node B (be equally generally marked as evolution NodeB, eNodeB,
Or eNB).It can be communicated with the Wireless Telecom Equipment being referred to as user equipment (UE).Although open the presented art of the present invention
Language and example are generally directed to 3GPP system and standard, but teaching disclosed herein can apply to any kind of wireless network or
Communication standard.
Fig. 1 is the schematic diagram of description communication system 100, and communication system 100 includes multiple communicating with network infrastructure 104
UE 102.Network infrastructure 104 includes evolution block core (EPC) 106 and E-UTRAN 108.EPC 106 includes moving
Management entity (MME) and gateway (S-GW) 112, they are passed through S1 interface and are led to the eNodeB 110 in E-UTRAN 108
Letter.The S1 interface of 3GPP definition supports EPC 106 and the direct many-to-many relationship of eNodeB 110.For example, different operator
Same eNodeB 110 (this is referred to as " network share ") can be operated simultaneously.E-UTRAN 108 is for LTE (i.e. 3.9G)
With the packet switch 3GPP RAN of LTE-Advanced (i.e. 4G), introduce for the first time in 3GPP version 8 and continue evolution.?
In E-UTRAN 108, eNodeB 110 is than general land wireless access used in Universal Mobile Telecommunications System (UMTS or 3G)
Conventional node B of network (UTRAN) is more intelligent.For example, the function of nearly all radio network controller (RNC) has been moved to
In eNodeB, rather than in single RNC.In LTE, interconnected by X2 interface between eNodeB 110, this makes
ENodeB 110 can forward or share information.
UE 102 is communicated with eNodeB 110 using the cellular frequency spectrum that Uu eats dishes without rice or wine to permit.UE 102 and eNodeB 110 that
Can be with transmitting control data and/or user data between this.In LTE network descending (DL) transmission can be defined as from
ENodeB 110 arrives the communication of UE 102, and up (UL) transmission can be defined as the communication from UE 102 to eNodeB 110.
Eated dishes without rice or wine direction communication by Ud from each other except by DL and UL of Uu interface transmission, also show UE 102.
In D2D communication, pass through Ud D2D interface as shown in Figure 1, UE 102 can directly be led to another one UE 102
Letter is it is not necessary to the route through eNodeB 110 or core net (such as EPC 106) communicates.D2D communicates due to can reduce core
The load of heart net (such as EPC 106) or wireless access network (such as E-URTAN 108) is interesting, due to direct and short distance
Communication path and increase data rate, public safety communication path is provided, and other functions is provided.D2D has been proposed to use
Share in local social networkies, content, location-based market, service advertisement, movement-Mobile solution and the neighbouring clothes of other type
Business (ProSe).
Various selections are had to realize such direct communication path between mobile device in principle.Implement at one
In example, D2D eats dishes without rice or wine Ud can be by using short-range communication technique, and such as bluetooth or Wi-Fi are realized, or by huge profit honeycomb
Licensed spectrum in communication system, such as 3GPP LTE or Wimax is realized.When through licensed spectrum communication, up (UL) frequently
Spectrum is normally used for minimizing the interference between the relatively large downstream signal of the power communicating with eNodeB.
D2D communication may be generally divided into two parts.Part I is proximity detection (or equipment discovery), wherein UE
102 can determine them within the distance of D2D communication.Proximity detection can be assisted by network infrastructure 104, can be by UE
102 at least a portion execution, or network infrastructure 104 can be largely independent of and be performed.Part II
It is direction communication, or D2D communication, between UE 102, this includes setting up the process of D2D session between UE 102 and reality
User or applied data communications.Using licensed spectrum D2D communication may or be likely to not in Mobile Network Operator
(MNO) under Sustainable Control.For example, UE 102 communicates it may not be necessary to have and eNodeB 110 between to participate in D2D
Activation connects.
The basic problem of radio communication be reduce interference or management contention, in order to wireless device will not the same time/
Frequency is transmitted and is interfered.If the connection with RAN or core net is maintained, RAN or core net can be used for assist control UE
Between communication to avoid interference.However, when concentrate coordinate infeasible when, distributed contention can be used for control channel access and
Reduce or eliminate interference.For example, if the user while being operated outside the coverage of cellular network, or led to by D2D
Coverage is walked out, the equipment of D2D configuration may need contention transmission time during letter.In view of the above, applicant realizes
It is one of limiting factor of D2D communication to contention expense, and have shown that the efficiency needing to lift distributed contention.
In the distributed scheduling of transmission time, the wireless device of such as UE can be allocated unique priority value.So
Priority can be used for determining the when allocated chance sending of each UE afterwards, thus reduces or eliminates striving of same transmission time
With.In traditional scheduler mechanism, the FlashLinQ of such as high pass, transmission request needs to send repeatedly in successive ignition, to adjust
Spend parallel D2D link, this link sharing has the same channel of high spatial huge profit.The FlashLinQ framework of high pass is disclosed in
“FlashLinQ:A Synchronous Distributed Scheduler for Peer-to-Peer Ad-hoc
Networks " (X.Wu, S.Tavildar, S.Shakkottai, T.Richardson, J.Li, R.Laroia, A.Jovicic,
IEEE/ACM Transaction on Networking, in August, 2013).
In FlashLinQ, once the recipient of D2D link obtains link (having in all unscheduled links
Highest priority), authorization messages are broadcasted all UE in the range of it by it, notify UE to authorize communication by its sender
Channel.After receiving authorization, the recipient of unscheduled D 2D link (or even having limit priority) can not be by this channel authorization
To its sender, because recipient does not know whether its sender can cause the unacceptable interference to schedule link.
Recipient has to wait for its sender to check compatibility, and sends transmission request again or abandon competing.It is right to abandon
The action of another D2D link competition is referred to as abandoning (surrender).
Applicants have noted that and be disclosed that system and method, wherein transmission request can be less by transmission
Number of times, with schedule parallel D2D link, maintains a substantially optimum data throughout with respect to the theoretical upper limit.Implement at one
In example, the recipient just obtaining channel can be configured to check for the compatibility of unscheduled transmission side, and in authorization messages middle finger
Go out incompatible sender, thus create and strengthen authorization messages.After receiving enhancing authorization messages, there is high priority
Unscheduled recipient can send authorization messages immediately it is not necessary to wait the additional request of corresponding sender.In an embodiment
In, the authorization messages including incompatible sender instruction consume the as many resource with original authorization messages, and lead to strive
Reduce 30-40% or more with expense with respect to traditional scheduler mechanism (for example existing FlashLinQ framework).
In one embodiment, teaching disclosed by the invention can serve as the improvement of existing FlashLinQ framework.At one
In embodiment, teaching disclosed by the invention can serve as the contention mechanism of unique novelty, separates completely from FlashLinQ framework
Or it is independent.Although give various related with FlashLinQ framework or compared with example, those skilled in the art will
Recognize that the present invention is open and can be applicable to other frameworks or communication protocol.
In one embodiment, UE includes asking receiving unit, interference assembly and authorizes/refusal assembly.Request reception group
Part is configured to send UE reception the first signal from first, and this first signal designation to the request of UE transmission, and will receive one
Individual or multiple additional signals, indicate that one or more additional transmission UE just ask to be sent to corresponding target UE.Interference assembly base
Identify one or more incompatible UE in the receiving power of the first signal and one or more additional signal.Incompatible UE includes
At least one of one or more of additional transmission UE.Authorize/refuse assembly to be configured to send authorization signal, instruction is right
The mandate of the first transmission UE, and instruction stops one or more incompatible UE transmission further.
Fig. 2 illustrates an embodiment of the logic business time slot 200 of discussion in FlashLinQ framework.Note that this
The teaching that place provides can be used for changing FlashLinQ framework or can be used in completely self-contained framework.FlashLinQ framework
Discuss and be only provided by way of explanation and background technology.In one embodiment, logic business time slot 200 includes resource
Minimal segment, it can be dispatched by mobile terminal or UE.In the embodiment depicted, logic business time slot 200 may include multiple just
Hand over frequency and a time span.For example, logic business time slot 200 can have the length of general 2 milliseconds (ms).During logic business
Gap 200 is divided into multiple sections, dispatches section, rate scheduling end, data segment and confirmation (Ack) section including connecting.In an embodiment
In, connect scheduling section and be used for dispatching the transmission of data segment, and be carried out and solve the place of channel contention.Rate scheduling section
May include from the scheduled pilot tone (Pilot) of sender and indicate (CQI) from the channel quality of recipient.Data segment can
During occurring including scheduled transmission or within time block and/or resource.Ack section sends during can be used for confirming data segment
Being properly received of data.
In one embodiment, channel contention occurs during connecting scheduling section.For the sake of clear, it will thus provide connect scheduling and
The simplicity of explanation of channel contention.Connect scheduling section and be divided into single block, including transmission request block (Tx- asks block) and bandwidth
Granted block.Each block is shown as being divided into multiple units, is referred to as symbol or tone.In one embodiment, each symbol or
Tone corresponds to a D2D link between D2D UE or UE.During Tx- request block, each wishes the D2D of transmission
UE transmit power on its corresponding tone, the transmission request of instruction current logic business time-slot.During bandwidth authorizing block,
The recipient UE of high priority D2D UE or D2D link is responded with mandate.This mandate may include corresponding to request D2D UE
Tone on transmit power.In one embodiment, a series of optional Tx- request blocks and bandwidth authorizing block are (for example, see scheme
3, be discussed below) be performed, until all links being scheduled are scheduled.Speed during follow-up rate scheduling section is adjusted
Data transfer during degree, data segment and the confirmation during Ack section are subsequently performed in logic business time slot 200.
Above embodiment is only provided in exemplary fashion.Further details and exemplary reality are discussed below
Apply example.
Fig. 3 illustrates the method for channel contention, including conventional channel contention 302 (such as FlashLinQ) and enhancing
Channel contention 304.Every kind of mechanism is all illustrated with a lot of blocks, and each block represents Tx- request block or bandwidth authorizing block.In some feelings
Under condition, the different structure of Tx request and Rx request can be used.
In conventional channel contention 302, at least one Tx is had to ask for each bandwidth authorizing.For example, for N number of bandwidth
Authorize, take at least 2N block or section.In strengthening channel contention 304, take N+1 block or section, please because needing only to a Tx
Seek block.More than one Tx- is needed to ask block can send at least come the D2D UE to allow to be hopeful to transmit in some cases
One transmission request.However, Tx- asks the quantity of block to remain the number of a fixation, and will be N+x, wherein N is to authorize
Quantity, x is the quantity that Tx asks block, to allow each transmission Tx can send a Tx request.Therefore, as described, increase
Strong channel contention 304 eliminates additional transmission asks and causes expense to greatly reduce.
Go to Fig. 4, the block diagram being configured to execute the UE 102 of efficient channel contention is illustrated.UE 102 includes asking assembly
402nd, ask receiving unit 404, priority component 406, disturb assembly 408, authorize/refuse assembly 410, authorize receiving unit
412nd, transceiver 414 and processor 416.The form that assembly 402-416 passes through example shows, and not included in all enforcements
In example.In certain embodiments, only include the combination in any in, or two or more 402-416.In an embodiment
In, UE 102 is configured to as sending UE or receiving UE work, as needed for D2D link or existing communication.
Request assembly 402 is configured to send a transmission request to target UE (or receiving UE).In one embodiment,
Request assembly 402 has data to be sent to reciprocity UE by D2D link in response to determining UE 102, and sending a transmission please
Ask.Request assembly 402 can be sent to reciprocity UE by D2D link by transmitting request in Tx- request block during connecting scheduling.
In one embodiment, request assembly 402 can be by the tone of tone matrix, such as the Tx- of Fig. 2 asks the tone of block
Upper transmit power is sending above-mentioned transmission request.In one embodiment, the other UE in the range of UE 102 can be in different tones
On Tx- request block in send transmission request.Because can be distinguished between tone, it is related to the vicinity in D2D communication
UE is possible to distinguish which UE sends in request.In one embodiment, request assembly 402 is configured to connect scheduling for each
Or logic business time slot sends a transmission request.For example, during each business time-slot, only one transmission request need by
Send to obtain or to produce channel.In one embodiment, UE 102 can wait during multiple bandwidth authorizing blocks or monitor,
Ask without sending additional transmission.In one embodiment, request assembly 402 in optimum link power, for example, will be used
In the power in link, to send transmission request.
Request receiving unit 404 is configured to receive the transmission request being sent by one or more equity UE.In a reality
Apply in example, request receiving unit 404 receives transmission request from the reciprocity UE of the part carrying out D2D session with UE 102.For example,
Request receiving unit 404 can receive the signal that the reciprocity UE of instruction will send data to UE 102.In one embodiment, request connects
Receive assembly 404 and can receive transmission request from the UE being not connected with.For example, UE request nearby is connected to corresponding target UE, please
Ask receiving unit 404 can receive these requests.Although neighbouring UE can request that is transferred to different UE, UE 102 can use this
Individual information is used for channel contention.For example, UE 102 be able to determine whether to exist the higher priority not also being scheduled UE (or
UE corresponding to higher priority D2D link).In one embodiment, the power that received or include in transmission request
The power of other information, such as transmission, can use after being stored for.
Priority component 406 is configured to determine that UE 102 and/or the priority of one or more UE nearby.In a reality
Apply in example, priority component 406 determines priority based on predetermined algorithm, so as the UE near other can determine same excellent
First level.For example, the link between UE can distinguish order of priority, so that high priority link can be before low priority link
Obtain channel.Low priority link (or the UE as a low priority link part) waits scheduling grant message until all
The link of higher priority is scheduled, abandons or is prevented to transmit.In FlashLinQ, if low priority link predicts it
Unacceptable interference will be caused to scheduled high priority link, this low priority link will abandon channel contention, that is, bend
Clothes (yield;Abandon).
In an embodiment of the application, the priority of each UE can be determined based on predetermined algorithm, for example at random
Number maker or public seed.For example, all UE know the priority of all other UE in the range of wireless proximity.Implement at one
In example, UE is configured to determine that the priority (or priority of request UE) of its own link and sends out to other corresponding targets UE
Send the priority of other UE of transmission request.In one embodiment, priority component 406 can determine which sound in tone matrix
Adjust which UE (in such as Fig. 2, Tx- asks the tone in block and bandwidth authorizing block) corresponds to.In one embodiment, priority
Assembly 406 can determine the priority of another UE or D2D link based on the tone for transmission request.
Identifying in the D2D transmission that interference assembly 408 is configured to occur at the same time to have causes the height of substantial interference can
One or more UE of energy property.For example, interference assembly 408 can detect the receiving power of transmission request, and this transmits a request to certainly please
Seek the source UE sending to UE 102, also detection has transmitted to other UE and belongs to other D2D chains in the range of UE wireless proximity
The receiving power of the transmission request connecing.Once source UE and other transmission UE sent in the same time, through-put power or receiving power
It is subsequently used in estimation signal-to-noise ratio (SIR).In one embodiment, during interference assembly 408 is based on Fig. 2 Tx- request block
Send transmits a request to estimation SIR.In one embodiment, interference assembly 408 be storable in UE 102 obtain channel when that
The instruction of one or more UE nearby of transmission should be stoped a bit.If nearby the sir value of UE is higher than selected threshold value and excellent
First level is less than the priority of UE, and these neighbouring UE can be prevented from.
Authorize/refuse assembly 410 to be configured to send authorization signal, this authorization signal instruction source UE will be allowed in business
Send in time slot.In one embodiment, to request UE, authorization signal indicates that it allows to send.Authorization signal can include tone
Matrix, authorizes/refusal assembly 410 transmit power on the tone corresponding to the authorized UE allowing to send in this matrix.
For example, authorization signal may include the power on one of in the tone of bandwidth authorizing block of Fig. 2.Corresponding UE can receive mandate
Signal, and know that it has been authorized to license and has sent during the data segment of business time-slot.
In one embodiment, authorization signal can also include the one or more UE (or D2D link) being prevented from sending
Instruction.For example, authorization signal may indicate that one or more UE that can disturb (being determined by interference assembly 408) are prevented from sending.
Stop transmission from limiting other UE to send and cause to the interference authorizing UE or link.In one embodiment, authorization signal bag
Include tone matrix, wherein authorize/refuse assembly 410 to be prevented from corresponding to or forbid sending work(on the tone of UE sending
Rate.For example, authorization signal may include the one or more euphonic power of Fig. 2 bandwidth authorizing block, to indicate those UE by
Stop.Thus, bandwidth authorizing block (or other authorization messages) can be used for a UE authorization channel, and refuse one or
Multiple other UE send.In one embodiment, based on priority, other UE can determine which UE is authorized to or prevention.For example,
The tone of the limit priority of transmit power is considered as to authorize thereon, and the tone of any low priority can be considered as resistance
Stop or refusal sends.In one embodiment, different from each UE, there is a tone, tone matrix can be included at least
Two tones (such as one authorizes tone and a refusal tone) of one UE.
In one embodiment, authorize/refuse assembly 410 is configured to whether authorization requests UE are linked into channel.Authorize/
Refusal assembly 410 can according to one or more priority, have authorize and/or stop instruction authorization messages and estimation channel
SIR is determining whether authorization channel.In one embodiment, authorize/refusal assembly 410 can be based on having limit priority
D2D link determines that channel should be authorized to.For example, if the D2D link or UE priority than all UE sending transmission request
Height, authorizes/refuses assembly 410 to can determine that channel should be authorized to, and sends authorization messages (the one or more preventions of inclusion
Instruction, refuses to send to one or more of the other UE).In one embodiment, if UE is not the request UE of limit priority,
Authorize/refuse assembly 410 always according to previous authorization messages and to stop instruction from determining whether authorization channel.For example, if authorized
Receive UE by another before message to send, authorize/refuse assembly 410 can consider that corresponding UE has been authorized to channel, and
More authorization messages will not be sent.Similarly, authorize/refusal assembly 410 can determine which UE or link previously
Do not allowed in authorization messages or refused.Based on authorizing and stoping instruction, mandate/refusal assembly 410 can determine that its D2D link
(the prevention instruction being for example not received by channel) whether can also be authorized to, and with the presence or absence of also uncommitted or clear and definite
Other higher priority UE of refusal channel.If there is no higher priority UE and not bright for corresponding D2D link
Really refuse, authorize/refuse assembly 410 to can determine that it should send authorization messages.
In one embodiment, authorize/refusal assembly 410 can also according to transmission request and/or one or more
The SIR to estimate channel for the authorization messages sending.For example, authorize/refuse assembly 410 can be determined according to all other transmission UE
SIR is too high, and is rejected by channel.Similarly, authorize/refuse assembly 410 to can determine that SIR is in acceptable scope, and
Send authorization messages, this authorization messages includes authorizing instruction, and may include one or more prevention instructions, for example, to having be higher than
The prevention of the low priority UE of the SIR of selected threshold value.
In one embodiment, authorize/refuse assembly 410 to be configured to ask block based in one or more initial transmission
The transmission request that period receives, to determine whether to authorize or refuse the transmission request from UE, in order to ask UE in business
It is not required to send again their transmission request during the connection scheduling of gap.
For example, the first authorization messages can be sent by a UE, and the second authorization messages subsequently can be sent by the 2nd UE, without
Any transmission request is sent between the first authorization messages and the second authorization messages.For example, one or more preliminary Tx- requests
Block can be followed by continuous bandwidth authorizing block it is not necessary to any additional Tx- asks block.In one embodiment, mandate disappears
Breath (or bandwidth authorizing block) is higher than one to one (1: 1) with the ratio of the request of each device transmission (or Tx- asks block).For example, single
Individual Tx- request block may include multiple transmission requests.However, in one embodiment, the transmission request of each UE only one can quilt
Send, because the transmission request repeating is unwanted.In one embodiment, the ratio of bandwidth authorizing block and Tx- request block
Can be at least 3: 2, at least 2: 1, or higher.In one embodiment, the ratio of bandwidth authorizing block and Tx- request block can be
3: 1 or higher.
In one embodiment, authorize/refuse the power that assembly 410 can be differently configured from optimum link power to send mandate to disappear
Breath (such as tone matrix), such as maximum transmission power or complete through-put power are to reach UE as much as possible and/or with maximum
Change the probability that authorization messages are received.For example, send authorization messages in higher-wattage and contribute to guaranteeing connecing corresponding to transmission UE
Receive UE and can receive authorization messages (or block instruction of any inclusion).In one embodiment, authorize/refusal assembly 410
Authorization messages can be sent in the power different from transmission request, such as than the high power of through-put power corresponding to transmission request.
In one embodiment, authorize/refusal assembly 410 can transmission in the case of not having any express authorization instruction
Refuse information.For example, authorize/refuse assembly 410 can send refuse information, it indicates which link or UE and corresponding father UE
Or link is incompatible.For example, the mandate of channel can be implied, so that there is no need clearly authorization channel.Because a lot
Link is unavailable during granted block, and usually, in same granted block, only one link can be authorized to, clearly refusal and
Hint mandate can lead to significantly more efficient channel contention.In one embodiment, under the fact that UE sends refuse information,
The mandate of channel can be suggested to corresponding link UE and any other neighbouring UE.
Receiving unit 412 is authorized to receive authorization messages.Authorization messages may include mandate instruction and one or more preventions refer to
Show, as discussed above.In one embodiment, authorization messages can store the related letter that use follow-up about authorization messages
Breath.For example, this information may be used in determining whether to send authorization messages, and whether the request that UE sends on channel is rejected,
Etc..In one embodiment, receiving unit 412 is authorized to be configured to during multiple continuous bandwidth authorizing blocks monitor mandate
Message.For example, authorize receiving unit 412 can monitor authorization messages, send additional transmission request without UE 102.In a reality
Apply in example, authorize receiving unit 412 can receive authorization messages, it indicates that one or more higher priority UE have been authorized to channel
And/or refusal channel.In one embodiment, authorize receiving unit 412 according to authorization messages, determine father UE, corresponding UE or
Whether D2D link has been rejected or authorization channel.
In one embodiment, authorization messages can be transmitted n iteration, and wherein n is positive, nonzero integer.Computing j=
1 ..., n-1 can run in previously described paragraph.For last iteration, j=n, sound out mandate and can be transmitted.If
Meet the interference threshold to its own signal at recipient, such as signal interference value threshold value, previously have no chance in iteration to send out
Send bandwidth authorizing all recipients can heuristically authorization channel, all bandwidth authorizing that sender subsequently receives according to it
May determine whether to send.If higher priority link thinks that sender is incompatible, sender will not send.This will be below
Paragraph in be described more fully.
Transceiver 414 may include antenna and the circuit for sending and receiving wireless signal.For example, transceiver 414 can wrap
Include radio, be configured to run in license or unlicensed spectrum.In one embodiment, transceiver 414 can be configured to
Based on one or more agreements, such as Bluetooth protocol, 3GPP agreement, Wi-Fi agreement, Wi-Max agreement or any other agreement are come
Run.In one embodiment, transceiver 414 can send and receive other assembly 402-412 for UE 102 and 416 letter
Number.
Processor 416 may include any general purpose or special processor.In one embodiment, at processor 416
The information that one or more of the other assembly 402-414 of reason UE 102 provides or stores.In one embodiment, one or more
Other assembly 402-414 may include the code being stored in computer-readable medium, is executed by processor 416.
Fig. 5 is the schematic diagram that the traditional contention using such as FlashLinQ architecture and method is described.Fig. 5 illustrates in bag
Include the cycle very first time 502, multiple times of the second time cycle 504, the 3rd time cycle 506 and the 4th time cycle 508
Communication in cycle, between multiple transmission equipment (Tx 1, Tx 2, Tx 3) and receiving device (Rx 1, Rx 2, Rx 3).One
In individual embodiment, the cycle very first time 502 and the 3rd time cycle 506 correspond to Tx- and ask block, and now transmission request is sent out
Send.In one embodiment, the second time cycle 504 and the 4th time cycle 508 correspond to bandwidth authorizing block, now authorize and disappear
Breath is sent.Solid line represents the transmission being sent to equity by D2D link or connecting equipment, and dotted line represents that transmission can also quilt
Equipment in addition to connection or chained device receives.
In Fig. 5, three link competition transmission:Link 1, it includes Tx 1 and Rx 1;Link 2, it includes Tx 2 and Rx 2;
And link 3, it includes Tx 3 and Rx 3.Link 1 and link 3 can be with parallel runnings, because they are a good distance away and mutual
Between interference very weak (i.e. SIR is very high).Link 2 can not be with link 1 or link 3 parallel running.Transmission from high to low is excellent
First level is link 1, link 2 and the such order of link 3.In other words, if link 1 needs, then link 2 should be abandoned,
And if link 2 needs, then link 3 should be abandoned.In the cycle very first time 502, sender Tx 1, Tx 2 and Tx 3
Send transmission request, indicate that they are wished in slot transmission current or on the horizon.Recipient Rx 1, Rx 2 and Rx 3 from
Corresponding sender and the sender corresponding to other links receive request.Based on request, sender will award according to priority
Power bandwidth (or channel).In the second time slot 504, Rx 1, it has highest priority, to Tx 1 authorization channel.By measurement
The receiving power of authorization messages, Tx 2 knows that it will cause too many interference to Tx 1 if it is with Tx 1 transmitted in parallel.Cause
This, Tx 2 abandons (surrendering), and does not send transmission request within the 3rd time cycle 506.Rx 1 based on measurement awards
The receiving power of power message, because Tx 3 does not result in the strong interference to Rx 1, Tx 3 passed through within the 3rd time cycle 506
Transmission transmits a request to compete again.Finally, Rx 3 is Tx 3 authorization channel within the 4th time cycle 508.
Fig. 6 is the schematic diagram that enhancing contention disclosed herein or more efficient contention are described.As illustrated, including first
In multiple time cycles of time cycle 602, the second time cycle 604 and the 3rd time cycle 606, multiple transmission equipment (Tx
1st, Tx 2, Tx 3) communicated and receiving device (Rx 1, Rx 2, Rx 3) between.In one embodiment, the week very first time
Phase 602 corresponds to Tx- asks block, period sender UE, Tx 1, Tx 2 and Tx 3 to send transmission request.In one embodiment,
Second time cycle 604 and the 3rd time cycle 606 correspond to the iteration of bandwidth authorizing block, and period authorization messages are sent.?
In this example, when authorization messages are sent, there is the iteration of n=2 bandwidth granted block, wherein n is positive nonzero integer.Real
Line represents the transmission being sent to equity by D2D link or connecting equipment, and dotted line represents that transmission can also be by except connection or chain
The equipment beyond equipment that connects receives.
In one embodiment, new contention mechanism is different from traditional mechanism, wherein sender do not need one time another
Participate in contention everywhere and (in same communication time slot, send multiple transmission requests).However, recipient can be configured to
Converse directly with one another to determine which link can run simultaneously.As shown in fig. 6, sender Tx 1, Tx 2 and Tx 3 can be
Transmission request is sent, similar to traditional contention mechanism in the cycle very first time 602.
Within the second time cycle 604, Rx 1 (having limit priority) is more than what traditional mechanism did.Especially, Rx
1 not only to its sender Tx 1 authorization channel, and the transmission of Tx to be stoped 2.Because Rx 1 can be by checking Tx's 2
The receiving power of transmission request can determine measuring the interference from Tx 2 (for example within the cycle very first time 602), Rx 1
Signal-to-noise ratio (SIR) is higher than the threshold value of selection, so that link 1 (between Rx 1 and Tx 1) and link 2 are (in Rx 2
And Tx 2 between) incompatible.Therefore, Rx 1 can stop Tx 2 proactively, replace and wait Tx 2 to check interference level and to put
Abandon.Because this determination is completed by Rx 1, and occur in authorization messages, all of link (and recipient) both knows about
Tx 2 is rejected.
In the 3rd time cycle 606 (i.e. n-2), since Rx 3 knows that Tx 2 is prevented by Rx 1, then Tx3 all not
There is in scheduled link highest priority.If the interference from Tx 1 is less than threshold value, Rx 3 is to Tx 3 authorization channel
So that link 1 and link 3 can be with parallel runnings.Therefore, new mechanism compares traditional mechanism, can make same amount of link more
It is scheduled soon (within less time cycle).For example, the contention in Fig. 6 is faster by about 25% than the contention in Fig. 5.With chain
Way amount increases, and percent speed increase can persistently be lifted.This will lead to be greatly saved control overhead.In some cases, hundred
Point specific rate increase can exceed 30%, more than 40%, and/or close to 50%.
Fig. 7 provides the schematic diagram of the cell with 11 links.In this example, there are 11 potential chains between UE
Road.Wish that the UE sending is referred to as sender UE.The UE communicating with sender UE is referred to as recipient UE.Each UE can be joined
It is set to and can send and receive.
In the example of fig. 7, each in recipient UE 1,3,4,6,10 and 11 has been received by transmission request, and
Priority level has been assigned.Each recipient UE knows the priority level of other recipient UE.In addition, passing according to sending
The SIR level determining during defeated request, each UE also knows the potential interference that other UE can cause.Recipient UE is configured to basis
The rule of Fig. 4 description, to their corresponding sender's UE transmission bandwidth authorization messages.Recipient 6 is configured to expectation and uses chain
Road 1 is sending its bandwidth authorizing.In sending iteration, recipient 6 can receive recipient 3 and 4 by recipient 1 at it
Bandwidth authorizing in the instruction that is prevented from, therefore, 6 can be transferred to before and transmission bandwidth request in sending iteration.
If sufficient amount of bandwidth authorizing is allowed to, then be up to the space encapsulation of relative compact in cell.So
And, if iterationses very little (i.e. 1 to 2 iteration), this mechanism can not execute well.When Fig. 6 example compared to
When the example of Fig. 5 decreases expense, additional improvement can be carried out to reduce expense further and to increase MPS process handling capacity
With close to the theory upper limit.
Consider that iterationses are 1 situations (i.e. n=1).In priority list shown in Fig. 7, in bandwidth authorizing message
First time iteration in, only link 1 be scheduled.Even if link 1 closes link 3 and 4, know this information to link 6
When, the bandwidth authorizing stage finishes.This is real situation for all such priority lists.Work as iterationses
During equal to 1, only when recipient is located at the highest point of its priority list, this reception is scheduled just now.This situation can
With worse.For example, each follow-up recipient k can have recipient k-1 (i.e. recipient 2 positioned at priority list top
There is the recipient 1 being listed in top, recipient 3 has the recipient 2 being listed in top, etc.).In this case, only chain
Road 1 can be scheduled, and it may be at all less than optimal.Second iteration can improve process, and wherein incompatible list is tested
Measure and before recipient can jump to, but this process still apart from optimal spatial huge profit with far.
According to one embodiment of present invention, new program can be in last (nth iteration) quilt of bandwidth authorizing message
Execution, rather than follow the tracks of same program in each iteration.Operation during j=1 ..., n-1 iteration and earlier paragraphs
Described in identical.For last iteration, j=n, in a n-1 iteration, the institute of transmission bandwidth of having no chance mandate
There is recipient can send exploration to authorize.If meeting SIR threshold for the signal of oneself at recipient, recipient UE can try
Visit authorization channel.This interference is corresponding to being authorized to or be considered and other incompatible other high priority chains of bandwidth authorizing
Road.In this example, sender can be configured to according to all bandwidth authorizing, be made whether the final decision sending.If
Sender is thought incompatible by higher priority link, and it will not send.
Bandwidth authorizing can be transmitted under total power.If sender incompatible (i.e. with the reception with higher-priority
There is between side the SIR less than selected threshold value), send under total power and provide in bandwidth authorizing message the incompatible of transmission
List reaches the high probability of sender, and the incompatible list of transmission in bandwidth authorizing message is used for indicating that recipient turns off
Sender.
With regard to authorization messages, as disclosed, there are a variety of modes to realize these enhancing message or mandate/refusal
Message.For example, as it was previously stated, the enhancing of tone matrix (referring to Fig. 2) proposing in FlashLinQ or change can be used for offer and award
Power and prevention instruction.Especially, in FlashLinQ, the periodicity pitch in authorization messages is uniquely mapped to link identification
Accord with (ID), and these tones are according to priority arranged in domain logic.For each authorization messages, only correspond to mandate
The tone of link has power.All other tone does not have power.On the contrary, at same group in an embodiment of mechanism and enhancement mechanism
More information are carried in tone.Except transmit power in authorization link, authorize recipient also corresponding to meeting to authorizing chain
Transmit power on the tone of link (link that for example interference assembly 408 identifies) that road causes strongly to disturb.Incompatible link
Euphonic power show that those links are unavailable.Since authorization link is authorizing all unscheduled chain of recipient's perception
There is in road highest priority, the tone of unavailable link is always below the tone of authorization link.Therefore, according to priority
First group of tone in the tone matrix of classification is considered as to authorize tone, and the other group tones below priority are considered
It is unavailable tone.
As it was previously stated, in nth iteration, souning out mandate and can be transferred to all not transmissions in a n-1 iteration
The recipient of bandwidth authorizing.If recipient meets for the SIR threshold of oneself signal, then can transmit from recipient and authorize
Signal is to sender.If sender is not thought incompatible by higher priority link, sender subsequently can award according to bandwidth
Incompatible list in power can send determining it.
Corresponding to N number of bandwidth time slots, and compare with " god helps " scheduling as the theoretical upper limit, sound out the embodiment authorizing
Simulated n=1,2,3 and 10 time iteration.According to definition, " refreshing " can make at all senders and recipient be in a network
Each link is made refusal and is determined.Therefore, if link is denied to the recipient of higher priority, " refreshing " makes this decision
It is all visible for UE all other in network.Correspondingly, only when the higher priority that link is abandoned is scheduled, chain
Road can be abandoned.Using distributed mechanism, this can reach the upper limit of MPS process handling capacity.
In simulations, some parameters are chosen.Cellular deployment is simulated, has f interface of 1 row (21 cells), stands
The distance between point is 500 meters.This deployment is wrapped (wrapped around) to obtain more accurate interference model.UE D2D
Macrocell area is uniformly located to (pair).It is unified stochastic variable between 1 and 50 meter that UE adjusts the distance.When scheduled
When, to using all available bandwidth, such as 50 Physical Resource Block (physical resources blocks, PRBs) come D2D
Send data.LTE power control algorithm is used, and has the fractional coefficient of unity element (unity) and the mesh of 15 decibels (dB)
Mark signal noise ratio (SNR).Channel model is didactic ITU-P14.11-6 channel model.
MPS process handling capacity be plotted as every cell equipment to equipment (D2D) to quantity gulp down with respect to MPS process
The function of the amount of telling.During using souning out the method authorizing enhancing Fig. 4, as it was previously stated, result there occurs significant improvement.It is true that
In most cases this result can reach within the 1% of the upper limit in only 2 iteration.For single iteration (n=1), performance
Improve exciting.For substantial amounts of in each cell D2D UE couple, substantial amounts of iteration is needed to reach handling up close to the upper limit
Amount.Iterationses n can be based on and select with respect to the desired handling capacity of the upper limit.
As shown in flow process Fig. 8, another example provides the user equipment (UE) being configured to that device-to-device (D2D) communicates
Feature 800.This feature can be implemented as method or can be executed by the instruction on machine, and wherein these instructions are included extremely
On a few computer-readable medium or on non-volatile machine readable storage medium storing program for executing.UE can have one or more processors,
It is configured to receive the transmission request from sender UE at UE, as indicated at block 810.One or more processors can be from one
Or multiple additional sender UE receives transmission request, as shown in block 820.Each transmission request may include and sends sending out of transmission request
The priority level of the side of sending UE.In one embodiment, priority level can be chosen according to the demand of each UE, for example root
According to the type of the information of service quality (QoS)/transmission, bandwidth of UE etc..Alternatively, priority can be selected at random, and
And distribute to formed D2D couple each UE sender and UE recipient with UE neighbouring by D2D link communication.
The flow chart of Fig. 8 further includes that being directed to received transmission using one or more processors asks formation excellent
First level list, such as block 830.One or more processors may recognize that the incompatible UE on priority list is not simultaneous to be formed
Hold list, such as block 840.The priority level of incompatible UE is lower than the priority level sending UE, and the signal and between UE
Interference is less than selected threshold value than (SIR).One or more processors can be configured in n-1 iteration, to sender UE and
One or more additional sender UE transmission authorization messages and incompatible list.Alternatively, one or more processors can be joined
Be set to according to receiving in UE, from the priority list of one or more additional sender UE and incompatible list, abandon from
To the transmission of higher priority sender UE, wherein n is positive, nonzero integer to sender UE, as shown in block 850.One or many
Individual processor can be configured to be sent to sender UE in n-th iteration by souning out bandwidth authorizing, heuristically to permit
Permitted sender UE and sent D2D communication to UE in nth iteration in bandwidth authorizing, as shown in block 860.
In another example, the one or more processors of UE can be further configured to, as sender UE with than it
Between the higher one or more additional sender UE of priority level incompatible when, sound out bandwidth authorizing in receive come spontaneous
The D2D communication of the side of sending UE.One or more processors can be configured to, when sender UE and higher than its priority level and
And when also not receiving incompatible between the one or more additional sender UE of authorization messages, receive souning out in bandwidth authorizing
D2D communication from sender UE.
The one or more processors of UE can be configured to, when sender UE does not receive in n-1 iteration
During bandwidth authorizing, communicate souning out the D2D receiving in bandwidth authorizing from sender UE.One or more processors can be further
It is configured to send in total power level and sound out bandwidth authorizing.In one example, n can be configured so that 2 to provide bandwidth to award
The iteration twice of power message.Alternatively, n can be set to the value of 1 or the value more than 2, and such as 3,4,5 etc. to value 20 or more
Many.One or more processors can be configured to select the value of n to provide put down desired with respect to the upper limit for cell
All cell transmission handling capacities.For example, the value of n can be chosen, and averagely gulps down in order to some the UE pair cells in each cell
The amount of telling and such as god help the difference between the upper limit of the upper limit to be less than 5%, 4%, 3%, 2% or 1%.
In another example, distributed scheduling method 900 in device-to-device (D2D) network is in the flow process of Fig. 9
In figure explanation.The method includes receiving the operation of the transmission request from sender UE at recipient UE, as indicated by block 910.
Transmission request can receive from one or more additional sender UE, as shown in block 920.Each transmission request may include transmission and passes
The priority level of the sender UE of defeated request.The method further includes to form priority row using received transmission request
Table, as shown in block 930.Create the incompatible list of incompatible UE on priority list, such as block 940.Incompatible UE has ratio and sends out
The low priority level of the side's of sending UE priority level, and the signal-to-noise ratio (SIR) and recipient UE between is less than selected threshold
Value.
Method 900 can further include, in n-1 iteration, transmission bandwidth authorization messages and incompatible list are to transmission
Square UE and one or more additional sender UE, wherein n is positive nonzero integer, as shown in block 950.Alternatively, UE can be with base
In receiving priority list and incompatible list from one or more additional sender UE in recipient UE, to abandon transmitting
To higher priority UE, as shown in 960.In nth iteration, sound out bandwidth authorizing and can be transferred to sender from recipient UE
UE, heuristically to allow sender UE to send D2D communication to recipient UE during nth iteration bandwidth authorizing, as 970 institutes
Show.
Method 900 can further include, when sender UE and have than one of sender's UE higher priority grade or
Between multiple additional sender UE incompatible when, sound out bandwidth authorizing in receive from sender UE D2D communication.Another
Plant under operation, the method further includes, when sender UE awards with having than sender's UE higher priority grade and not receiving
When weighing incompatible between the one or more additional sender UE of message, receive from sender UE's souning out in bandwidth authorizing
D2D communicates.The method further includes, when sender UE does not also receive bandwidth authorizing in n-1 iteration, is souning out bandwidth
D2D communication is received from sender UE in authorizing.
Method 900 can further include, total power level to sender UE send sound out bandwidth authorizing so that one or
Multiple additional sender UE can receive exploration bandwidth authorizing.Bandwidth authorizing can send n-1 iteration, wherein n=2.Can
Selection of land, the n of other values can also be chosen, and such as 1,2,3,4,5 etc., until 20 or more.In one embodiment, n
Value can be chosen so as to provide the expectation average cell transmission handling capacity of the theoretical upper limit with respect to cell throughout for cell.
Another example provides non-volatile machine readable storage medium storing program for executing, has instruction 1000 thereon, and these instructions exist
Following operation is realized by one or more processors when being executed, to provide the distributed scheduling in device-to-device (D2D) network,
As shown in the flowchart of fig. 10.These operations include:Process the transmission receiving from sender UE to ask, such as at recipient UE
Block 1010;Process the additional transmission request receiving from one or more additional sender UE, wherein each transmission request includes sending out
Send the priority level of the sender UE of transmission request, such as block 1020;Form priority list using the transmission request being received,
As block 1030;Create the incompatible list of incompatible UE on priority list, wherein incompatible UE has more preferential than sender UE
The low priority level of level grade, and there is and recipient UE between the signal-to-noise ratio (SIR) less than selected threshold value, such as block
1040;For n-1 iteration, generate bandwidth authorizing message and incompatible list for transmission to sender UE and one or more attached
Plus sender UE, wherein n is positive integer, such as block 1050;Or alternatively, send out from one or more adding based at recipient UE
Priority list and incompatible list that the side of sending UE receives, determine that sender UE should abandon the transmission of higher priority UE,
As block 1060;And generate in nth iteration and transmit to the exploration bandwidth authorizing of sender UE, heuristically to allow sender
UE carries out D2D communication with recipient UE in the bandwidth authorizing of nth iteration, such as block 1070.
At least one non-volatile machine readable storage medium storing program for executing can further include to instruct, when it is by one or more process
During device execution, including:When sender UE with there are the one or more additional senders higher than the priority level of sender UE
When UE is incompatible, process the D2D communication from sender UE in souning out bandwidth authorizing;And/or as sender UE and more excellent than it
First level higher grade and also one or more additional sender UE that do not receive authorization messages between incompatible when, souning out
Process in bandwidth authorizing from the D2D communication sending UE.
At least one non-volatile machine readable storage medium storing program for executing can further include to instruct, when it is by one or more process
During device execution, including:When sender UE does not receive bandwidth authorizing in n-1 iteration, sound out bandwidth authorizing in process from
The D2D communication that sender UE receives;And/or indicate that will sound out bandwidth authorizing in total power level sends to transmission from recipient UE
Square UE, so that one or more additional sender UE can receive exploration bandwidth authorizing.
At least one non-volatile machine readable storage medium storing program for executing can further include to instruct, when it is by one or more process
During device execution, including:Setting bandwidth authorizing iterationses make its value of generation n=2;And/or select the value of n to provide phase to cell
Expectation average cell transmission handling capacity for the cell throughout theory upper limit.
Figure 11 provides illustrating of wireless device, and such as user equipment (UE), movement station (MS), mobile wireless set
Standby, mobile communication equipment, board, portable equipment or other types of wireless device.Wireless device may include one or many
Individual antenna, is configured to and node, grand node, low power nodes (LPN), or transfer station, for example base station (BS), evolution Node B
(eNB), Base Band Unit (BBU), long distance wireless head end (RRH), remote radio equipment (RRE), relay station (RS), wireless device
Or other kinds of wireless wide area network (WWAN) access point is communicated (RE).Wireless device can be configured with least one
Plant wireless communication standard communication, access (HSPA), bluetooth and WiFi including 3GPP LTE, WiMAX, high-speed packet.Wireless device
Single antenna can be used for every kind of wireless communication standard, or for various wireless communication standard using shared antenna.No
Line equipment can communicate in WLAN (WLAN), wireless personal area network (WPAN) and/or WWAN.
Figure 11 additionally provides mike and the explanation of one or more speaker, and it can be used for the audio input of wireless device
And output.Display screen can be liquid crystal display (LCD) screen or other types of display screen, such as Organic Light Emitting Diode
(OLED) show.Display screen can be configured to touch display screen.Touch display screen can be using electric capacity, resistance or other types
Touch screen technology.Application processor and image processor can be coupled to internal storage to provide process and display capabilities.
Nonvolatile memory port can be also used for providing a user with data input/output intent option.Nonvolatile memory port is also
Can be used for the memory capabilities of extended wireless device.Keyboard can be integrated into wireless device or be connected wirelessly to wirelessly set
Standby, to provide extra user input.Dummy keyboard can also be provided by using touch screen.
Various technology, or its specific aspect or part, can be with the program code (for example instructing) in tangible medium
Form is realized, for example floppy diskette, CD-ROM, hard disk drive, non-transitory computer-readable storage media or other
What computer-readable recording medium, wherein, when program code is written into and is executed by the machine of such as computer, this machine can
Become the device realizing various technology.Circuit may include hardware, firmware, program code, executable code, computer instruction and/
Or software.Non-transitory computer-readable storage media can be not include the computer-readable recording medium of signal.Once journey
Sequence code executes on programmable computers, and computing device may include the readable storage medium of processor, processor and (includes volatile
Property, nonvolatile memory and/or memory element), at least one input equipment and at least one outut device.Volatibility, non-
Volatile memory and/or memory element can be RAM, EPROM, flash drive, CD-ROM driver, disc driver, solid-state
Driver or other medium for storage of electronic.Node and wireless device can also include transceiver module, enumerator
Module, processing module and/or clock module or timer module.It is capable of or one using various technology described herein
Or multiple program can using application programming interfaces (API), reusable control etc..Such program is implemented in advanced procedures
To communicate with computer system in change or object-oriented programming language.However, program can collect or machine language is realized, if
If necessary.Under any circumstance, language can be compiling or interpretative code, and and hardware realization combination.
It should be appreciated that a lot of functional units described in description have been marked as module, in order to more distinguishingly emphasize
They realize independence.For example, module can be implemented as hardware circuit, including customization VLSI circuit OR gate array, ready-made
Quasiconductor (such as logic chip, transistor or other detached assembly).Module equally can be realized by programmable hardware device,
Such as field programmable gate array, programmable logic array, programmable logic device etc..
In one example, multiple hardware circuits can be used for realizing the functional unit described in description.For example, first is hard
Part circuit can be used for execution and processes operation, and the second hardware circuit (such as transceiver) can be used for and other entity communications.
First hardware circuit and the second hardware circuit can be incorporated into a hardware circuit, or alternatively, the first hardware circuit and second
Hardware circuit can be separate hardware circuit.
Module is also implemented as the software of all kinds computing device.The mark module of executable code is permissible,
For example, including the physically or logically block of one or more computer instructions, its can for example be organized into a target, program or
Function.But, the execution of mark module needs not be and is physically located at one, can include being stored in the different of diverse location
Instruction, when being joined logically together, it includes module and realizes the above-mentioned purpose of module.
In fact, the module of executable code can be single instruction, perhaps MIMD, or several differences can be distributed in
Code segment in, between distinct program and cross over different memory equipment.Similarly, peration data herein can in module quilt
Identify and illustrate, and can be implemented in any suitable form, and group in the data structure of any suitable type
Knit.Peration data can be collected as single data set, or can be distributed in the diverse location including different storage device, and
Electronic signal can be at least partially, merely as be present on system or network.Module can be passively or actively, including
Operation and the agency executing desired function.
Mean that the special characteristic associating with example, structure or feature are included in this with regard to " example " in this specification
In at least one bright embodiment.Therefore, the term " in one example " that in this specification, many places occur is not necessarily referring to same
One embodiment.
As used herein, for facility, multiple projects, structural element, element and/or material can present
In common list.However, these lists should be interpreted that each member of list is identified separately as independent and unique
Member.Therefore, only because not being denoted as contradiction positioned at same group, the single member of this list should not be explained
Real equivalent for any other member of unified list.In addition, various embodiments of the present invention and example can be counted as
It is the selecting object of various assemblies.It should be appreciated that such embodiment, example and selection are not construed as each other in fact
Equivalent, but should be considered as independence of the present invention and autonomous representative.
In addition, described feature, structure or characteristic can groups in one or more embodiments in any suitable manner
Close.In the following description, there is provided a lot of details, such as layout, distance, network example etc., to provide for this
The fully understanding of inventive embodiments.Those skilled in the relevant art will be it is realized that however, the present invention can be in neither one or many
Individual detail, or have other methods, assembly, layout etc. to realize.In other examples it is known that structure, material or behaviour
Do not display the details of and describe with each aspect of the present invention of avoiding confusion.
Although aforesaid example is explanation of the principles of the present invention under one or more application-specific, for those abilities
It is clear that various forms can be carried out using the modification with implementation detail for field technique personnel, and do not need creative ability
Training, the principle also without departing from the present invention and concept.Correspondingly, except claim defined below, the present invention is not limit
Property processed.